A backdoor in xz
A backdoor in xz
Posted Mar 29, 2024 20:15 UTC (Fri) by bkw1a (subscriber, #4101)In reply to: A backdoor in xz by cjwatson
Parent article: A backdoor in xz
Posted Mar 29, 2024 20:23 UTC (Fri)
by cjwatson (subscriber, #7322)
[Link] (2 responses)
Posted Mar 29, 2024 22:02 UTC (Fri)
by dilinger (subscriber, #2867)
[Link] (1 responses)
On a lot of desktops, sshd isn't even installed. Is it critical security infrastructure because it's installed on some servers you consider important? What about the other daemons installed on important servers, like nginx/apache (and often the whole lamp stack)?
If you actually look at attack vectors, you start realizing pretty quickly that A LOT of software could (or should) be considered critical security infrastructure, and it's pretty unrealistic to not have to patch all of those bits of software to work on Debian's many desktop/server environments and hardware architectures. That also assumes that we can trust upstreams to not backdoor their code, which, as this example shows us, we clearly cannot.
Posted Apr 3, 2024 5:44 UTC (Wed)
by Lennie (subscriber, #49641)
[Link]
Posted Mar 29, 2024 23:58 UTC (Fri)
by mcatanzaro (subscriber, #93033)
[Link]
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz